lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 23 Mar 2015 14:28:02 -0700
From: James Forshaw <forshaw@...gle.com>
To: fulldisclosure@...lists.org
Subject: [FD] Windows Local WebDAV NTLM Reflection Elevation of Privilege

Windows Local WebDAV NTLM Reflection Elevation of Privilege
Platform: Windows 8.1 Update, Windows 7
Class: Elevation of Privilege
Disclosure Date: 18th March 2015
Reference: https://code.google.com/p/google-security-research/issues/detail?id=222

Summary:
A default installation of Windows 7/8 can be made to perform a NTLM
reflection attack through WebDAV which allows a local user to elevate
privileges to local system. It can also be used to escape application
sandboxes if TCP socket access is not blocked.

This issue was reported to Microsoft Security Response Center in
December 2014. Microsoft have decided not to change the default
behaviour to fix this issue, therefore all current Windows client
platforms are vulnerable to this privilege escalation unless
mitigations are applied.

Description:

NTLM reflection is a well known issue with Windows authentication.
It’s typically abused in networked scenarios to reflect credentials
from one machine to another. It used to be possible to reflect
credentials back to the same machine but that was mitigated in
MS08-068 by not honouring NTLM authentication sessions already in
flight. However this did nothing to stop cross-protocol attacks.

It’s possible to abuse cross-protocol NTLM reflection to attack the
local SMB server by forcing a local system process to access a WebDAV
UNC path. The NTLM authentication can then be reflected locally
authenticating to the Server service as NT AUTHORITY\SYSTEM. From this
it’s possible to elevate privileges by writing files to the admin
shares or connecting to the service manager named pipe.

This issue is known about and mitigations were created, such as
Extended Protection for Authentication. However due to compatibility
concerns these mitigations are not enabled by default. As Microsoft
will not be issuing a security bulletin for this issue following the
mitigation guidance below.

Mitigations:

By default all Windows client installations are vulnerable. Even
though the WebClient service is not started by default it’s possible
to start it using service triggers. The recommended fixes for this
issue are:

* Enable SMB signing, or,
* Enable SMB Server SPN verification

Please see the following references for more information on the issue
and how to configure the mitigations.

Security Advisory: https://technet.microsoft.com/library/security/973811
KB Article: http://support.microsoft.com/kb/973811
SMB EPA KB article http://support.microsoft.com/kb/2345886

You can also disable the WebClient service completely, however that
only mitigates this specific expression, it might be possible to
achieve the exploitation in other ways, such as DCE/RPC.

Disclosure Timeline:

- 18 Dec 2014: Sent Microsoft details of issue and proof-of-concept
- 18 Dec 2014: Received confirmation and MSRC case number 21243
- 20 Jan 2015: Received correspondence from Microsoft detailing their
thoughts that it’s a known issue and due to application compatibility
concerns mitigations default to off
- 20 Jan 2015: Requested clarification on whether Microsoft intended
to fix the issue or not
- 10 Mar 2015: Notified Microsoft of the upcoming 90 day deadline
- 18 Mar 2015: Got final response from Microsoft indicating they would
not be fixing the issue and consider mitigations sufficient
- 18 Mar 2015: Marked as WontFix and removed view restriction on the issue

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ